Towards Trustworthy Data in Networked Control Systems: A Hardware-Based Approach

Thomas Ulz, Thomas Wolfgang Pieber, Christian Steger, Rainer Matischek, Holger Bock

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

Abstract

The importance of Networked Control Systems (NCS) is steadily increasing due to recent trends such as smart factories. Correct functionality of such NCS needs to be protected as malfunctioning systems could have severe consequences for the controlled process or even threaten human lives. However, with the increase in NCS, also attacks targeting these systems are becoming more frequent. To mitigate attacks that utilize captured sensor data in an NCS, transferred data needs to be protected. While using well-known methods such as Transport Layer Security (TLS) might be suitable to protect the data, resource constraint devices such as sensors often are not powerful enough to perform the necessary cryptographic operations. Also, as we will show in this paper, applying simple encryption in an NCS may enable easy Denial-of-Service (DoS) attacks by attacking single bits of the encrypted data. Therefore, in this paper, we present a hardware-based approach that enables sensors to perform the necessary encryption while being robust against (injected) bit failures.
Originalspracheenglisch
TitelProceedings of the 2017 IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)
Herausgeber (Verlag)IEEE Industrial Electronics Society
Seitenumfang8
PublikationsstatusVeröffentlicht - 2017
Veranstaltung22nd IEEE International Conference on Emerging Technologies and Factory Automation: ETFA 2017 - Grand Resort Hotel, Limassol, Zypern
Dauer: 12 Sep 201715 Sep 2017
https://etfa2017.org/

Konferenz

Konferenz22nd IEEE International Conference on Emerging Technologies and Factory Automation
LandZypern
OrtLimassol
Zeitraum12/09/1715/09/17
Internetadresse

Fingerprint Untersuchen Sie die Forschungsthemen von „Towards Trustworthy Data in Networked Control Systems: A Hardware-Based Approach“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren